Chapter Topics

Part 1: Introduction

Chapter 1: What if a computer lies?



Part 2: Basic Techniques

Chapter 2:  Basic Cryptographic Techniques to deal with liars - Jack Lee (kris)

Chapter 3:  Reliable Communication and Byzantine Agreement - Saurabh Kumar (me)

Chapter 4:  Centralized vs Decentralized Security - Robin Huang (me)

Chapter 5:  Reputation and voting Systems - Ning Ma (kris)

Chapter 6: Secure routing protocols -  Trandinh Nguyen (me)

Chapter 7: Secure naming - Yuri Cantor, Hiren Kamdar (kris)



Part III: Application Scenarios

Chapter 8: Secure routing in real-world networks - Mrinalini Ajitkumar  (me)

Chapter 9: Securing the DNS - Chandan Hingorani (kris)

Chapter 10: Byzantine tolerant local area file systems -  Rohan Chandorkar (me)

Chapter 11: Byzantine tolerant wide-area systems - Brinsley D' Cunha, Varun (me)

Chapter 12: Untrusted storage - Rhishikesh (me)

Chapter 13: Security in P2P environments - Shaista (kris)

Chapter 14: Security in the wireless world - Abhishek (kris)

Chapter 15:  Firewalls and Intrusion Detection - Anita, Rajiv (me)

Chapter 16:  Enterprise security - John Lee (me)

Chapter 17:  Worms - Nishank (kris)

Chapter 18:  Botnets - Merin (kris)

Chapter 19:  Spyware and Malware Detectors - Ankur (kris)

Chapter 20:  OS Protection Mechanisms for PCs - Alpesh Shah (me)

Chapter 21:  Trustworthy computing - Pooja Verma (me)

Chapter 22:  Electronic voting machines - Pratik Shah (me)

Chapter 23: Privacy Preserving Operations - Sherman Chow (me)